default search action
Mahdi Jemmali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Loai Kayed B. Melhim, Mahdi Jemmali, Wadii Boulila, Mamoun Alazab, Shalli Rani, Hamish Campbell, Hajer Amdouni:
Leveraging Drone-Assisted Surveillance for Effective Forest Conservation: A Case Study in Australia's Daintree Rainforest. IEEE Internet Things J. 11(19): 31167-31179 (2024) - 2023
- [j21]Mahdi Jemmali, Wadii Boulila, Asma Cherif, Maha Driss:
Efficient Storage Approach for Big Data Analytics: An Iterative-Probabilistic Method for Dynamic Resource Allocation of Big Satellite Images. IEEE Access 11: 91526-91538 (2023) - [j20]Ameen Banjar, Mahdi Jemmali, Loai Kayed B. Melhim, Wadii Boulila, Talel Ladhari, Akram Y. Sarhan:
Intelligent Scheduling Algorithms for the Enhancement of Drone-Based Innovative Logistic Supply Chain Systems. IEEE Access 11: 102418-102429 (2023) - [j19]Mahdi Jemmali, Lotfi Hidri:
Hybrid Flow Shop with Setup Times Scheduling Problem. Comput. Syst. Sci. Eng. 44(1): 563-577 (2023) - [j18]Mahdi Jemmali, Abir Ben Hmida, Akram Y. Sarhan:
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks. J. Netw. Syst. Manag. 31(3): 59 (2023) - [j17]Sarah Eljack, Mahdi Jemmali, Mohsen Denden, Sadok Turki, Wael M. Khedr, Abdullah Algashami, Mutasim ALsadig:
A secure solution based on load-balancing algorithms between regions in the cloud environment. PeerJ Comput. Sci. 9: e1513 (2023) - [j16]Mohammad Mahmood Otoom, Mahdi Jemmali, Wael M. Khedr, Akram Y. Sarhan, Imen Achour, Ibrahim Alsaduni, Abdullah Bajahzar, Mohamed Nazih Omri:
Scheduling algorithms for data-protection based on security-classification constraints to data-dissemination. PeerJ Comput. Sci. 9: e1543 (2023) - [j15]Akram Y. Sarhan, Loai Kayed B. Melhim, Mahdi Jemmali, Faycel El Ayeb, Hadeel Alharbi, Ameen Banjar:
Novel variable neighborhood search heuristics for truck management in distribution warehouses problem. PeerJ Comput. Sci. 9: e1582 (2023) - [j14]Mahdi Jemmali, Ali Kashif Bashir, Wadii Boulila, Loai Kayed B. Melhim, Rutvij H. Jhaveri, Jawad Ahmad:
An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Trans. Intell. Transp. Syst. 24(12): 15633-15641 (2023) - [c6]Mahdi Jemmali, Loai Kayed B. Melhim, Wadii Boulila, Mafawez T. Alharbi:
Optimizing Fire Control Monitoring System in Smart Cities. ICCCI 2023: 497-509 - [c5]Mahdi Jemmali, Loai Kayed B. Melhim, Wadii Boulila, Hajer Amdouni, Mafawez T. Alharbi:
Optimizing Forest Fire Prevention: Intelligent Scheduling Algorithms for Drone-Based Surveillance System. KES 2023: 1562-1571 - [i1]Mahdi Jemmali, Loai Kayed B. Melhim, Wadii Boulila, Hajer Amdouni, Mafawez T. Alharbi:
Optimizing Forest Fire Prevention: Intelligent Scheduling Algorithms for Drone-Based Surveillance System. CoRR abs/2305.10444 (2023) - 2022
- [j13]Mahdi Jemmali, Loai Kayed B. Melhim, Abdullah Alourani, Md. Moddassir Alam:
Equity distribution of quality evaluation reports to doctors in health care organizations. PeerJ Comput. Sci. 8: e819 (2022) - [j12]Mahdi Jemmali, Loai Kayed B. Melhim, Fayez Al-Fayez:
Real time read-frequency optimization for railway monitoring system. RAIRO Oper. Res. 56(4): 2721-2749 (2022) - [j11]Mahdi Jemmali, Mohsen Denden, Wadii Boulila, Gautam Srivastava, Rutvij H. Jhaveri, Thippa Reddy Gadekallu:
A Novel Model Based on Window-Pass Preferences for Data Emergency Aware Scheduling in Computer Networks. IEEE Trans. Ind. Informatics 18(11): 7880-7888 (2022) - 2021
- [j10]Hani Alquhayz, Mahdi Jemmali:
Max-Min Processors Scheduling. Inf. Technol. Control. 50(1): 5-12 (2021) - [j9]Mahdi Jemmali, Lotfi Hidri:
Bounding schemes for the parallel machine scheduling problem with DeJong's learning effect. J. Parallel Distributed Comput. 156: 101-118 (2021) - [j8]Mahdi Jemmali:
An optimal solution for the budgets assignment problem. RAIRO Oper. Res. 55(2): 873-897 (2021) - [j7]Hani Alquhayz, Mahdi Jemmali:
Fixed Urgent Window Pass for a Wireless Network with User Preferences. Wirel. Pers. Commun. 120(2): 1565-1591 (2021) - [c4]Akram Y. Sarhan, Mahdi Jemmali, Abir Ben Hmida:
Two routers network architecture and scheduling algorithms under packet category classification constraint. ICFNDS 2021: 119-127 - 2020
- [j6]Mafawez T. Alharbi, Mahdi Jemmali:
Algorithms for Investment Project Distribution on Regions. Comput. Intell. Neurosci. 2020: 3607547:1-3607547:13 (2020) - [j5]Loai Kayed B. Melhim, Mahdi Jemmali, Basil AsSadhan, Hani Alquhayz:
Network traffic reduction and representation. Int. J. Sens. Networks 33(4): 239-249 (2020) - [j4]Lotfi Hidri, Mahdi Jemmali:
Near-optimal solutions and tight lower bounds for the parallel machines scheduling problem with learning effect. RAIRO Oper. Res. 54(2): 507-527 (2020)
2010 – 2019
- 2019
- [c3]Fayez Al-Fayez, Loai Kayed B. Melhim, Mahdi Jemmali:
Heuristics to Optimize the Reading of Railway Sensors Data. CoDIT 2019: 1676-1681 - [c2]Mahdi Jemmali, Loai Kayed B. Melhim, Mafawez T. Alharbi:
Randomized-Variants Lower Bounds for Gas Turbines Aircraft Engines. WCGO 2019: 949-956 - 2016
- [c1]Mafawez T. Alharbi, Mahdi Jemmali:
Artificial intelligent e-learning architecture. ICMV 2016: 103412G
2000 – 2009
- 2008
- [j3]Mohamed Haouari, Mahdi Jemmali:
Maximizing the minimum completion time on parallel machines. 4OR 6(4): 375-392 (2008) - [j2]Mohamed Haouari, Mahdi Jemmali:
Tight bounds for the identical parallel machine-scheduling problem: Part II. Int. Trans. Oper. Res. 15(1): 19-34 (2008) - 2006
- [j1]Mohamed Haouari, Anis Gharbi, Mahdi Jemmali:
Tight bounds for the identical parallel machine scheduling problem. Int. Trans. Oper. Res. 13(6): 529-548 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint